智能与数据重构世界
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

参考文献

[1]Gardner H.Frames of Mind:The Theory of Multiple Intelligences[M].Third Edition.NY:Basic Books,2011.

[2]Poole D,Mackworth A,Goebel R.Computational Intelligence[M].NY:Oxford University Press,1998.

[3]Russel S J,Norvig P.Artificial Intelligence:A Modern Approach[M].Second Edition.New Jersey:Prentice Hall,2009.

[4]Turing A M.The Essential Turing[M].Oxford:Oxford University Press,2004.

[5]Turing A.Computing Machinery and Intelligence[J].Mind,1950, 236:433-460.

[6]Luis V A,Blum,Hopper M,et al.CAPTCHA:Using Hard AI Problems for Security[C].Advances in Cryptology - EUROCRYPT 2003,2003.

[7]埃森哲.人工智能应用之道:高管指南[EB/OL].[2019-06-21].https://www.accenture.com/cn-zh/insights/digital/artificial-intelligence-explained-executives.

[8]Chan S.为什么需要知识图谱?什么是知识图谱?-KG的前世今生[EB/OL].[2017-12-0].https://zhuanlan.zhihu.com/p/31726910.

[9]Oivind D T,Anil K J,Torfinn T.Feature Extraction Methods For Character Recognition——a Survey[J].Pattern recognition,1996, 29(4):641-662.

[10]丁跃潮.人工智能教学网页[EB/OL].[2002-01-22].http://210.34.136.253:8488/AIteach/Chapt2_5.htm.

[11]Fukushima K.Neocognitron:A Hierarchical Neural Network Capable of Visual Pattern Recognition[J].Neural Networks,1988, 1:119-130.

[12]Lecun Y,Bottou L,Bengio Y,et al.Gradient-based Learning Applied to Document Recognition[J].Proceedings of IEEE,1998, 86:2278-2324.

[13]Krizhevsky A,Sutskever I,Hinton G E.ImageNet Classification with Deep Convolutional Neural Networks[C].NIPS,2012.

[14]Anumanchipalli G K,Chartier J,Chang E F.Speech synthesis from neural decoding of spoken sentences[J].Nature,2019, 568:493-498.

[15]Wodewp.机器视觉系统的一般构架与组成[EB/OL].[2019].http://www.vision263.com/2404.html.

[16]MarrD,Poggio T.From Understanding Computation to Understanding Neural Circuitry[J].AIM-357,1976.

[17]图灵人工智能.David Marr对计算机视觉的贡献[EB/OL].[2017].https://zhuanlan.zhihu.com/p/32307763.

[18]Lee T S,Mumford D.Hierarchical Bayesian inference in the visual cortex[J].Journal of the Optical Society of America A,2003, 20(7):1434-1448.

[19]Cong R,et al.Review of Visual Saliency Detection with Comprehensive Information[J].IEEE Transactions on Circuits and Systems for Video Technology,2018.

[20]Cheng M-M,Zhang Z,Lin W-Y,et al.BING:Binarized Normed Gradients for Objectness Estimation at 300fps[C].CVPR,2014.

[21]Dalal N,Triggss B.Histograms of Oriented Gradients for Human Detection[C].CVPR,2005.

[22]Lowe D G.Object Recognition from Local Scale-Invariant Features[C].ICCV,1999.

[23]Tomasi C,Kanade T.Detection and Tracking of Point Features[C].Carnegie Mellon University Technical Report,1991.

[24]Henriques J F,Caseiro R,Martins P,et al.High-Speed Tracking with Kernelized Correlation Filters[C].CVPR,2014.

[25]亿欧.盘点2年近10起自动驾驶事故:半数以上事故非自动驾驶系统过错[EB/OL].[2018-07-06].https://www.d1ev.com/news/qiye/71732.

[26]Cosgrove C,Yuille A L.Adversarial Examples for Edge Detection:They Exist,and They Transfer[EB/OL].[2019-06-02].https://arxiv.org/abs/1906.00335.

[27]Zeng X, Liu C,Wang Y,et al.Adversarial Attacks Beyond the Image Space[C].IEEE Conference on Computer Vision and Pattern Recognition,2019.

[28]Goodfellow I,Paperno T N,Huang S,et al.Attacking Machine Learning with Adversarial Examples[EB/OL].[2017-02-24].https://openai.com/blog/adversarial-example-research/.